9.5.01 HP P4000 SAN Solution User Guide (AX696-96168, February 2012)

Full provisioning
Full provisioning reserves the same amount of space on the SAN as is presented to application
servers. Full provisioning ensures that the application server will not fail a write. When a fully
provisioned volume approaches capacity, you receive a warning that the disk is nearly full.
Thin provisioning
Thin provisioning reserves less space on the SAN than is presented to application servers. The
SAN/iQ software allocates space as needed when data is written to the volume. Thin provisioning
also allows storage clusters to provision more storage to application servers than physically exits
in the cluster. When a cluster is over-provisioned, thin provisioning carries the risk that an application
server will fail a write if the storage cluster has run out of disk space. The SAN/iQ software adds
utilization and over-provisioned events as the cluster approaches 100% utilization. You can add
capacity to the cluster or delete unneeded snapshots to accommodate additional volume growth.
NOTE: Paying attention to the space utilization events on over-provisioned storage clusters is
critical to prevent a write failure on a thin volume.
Best practice for setting volume size
Create the volume with the size that you currently need. Later, if you need to make the volume
bigger, increase the volume size in the CMC and then expand the disk on the server. In Microsoft
Windows, you expand a basic disk using Windows Logical Disk Manager and Diskpart. For
detailed instructions, see “Changing the volume size on the server” (page 153).
Planning data protection
Data protection results from creating data redundancy for volumes on the SAN. Configure data
protection levels, called Network RAID, when you create a volume. Because data is stored
redundantly on different storage systems, all data protection levels are tied to the number of
available storage systems in a cluster. Network RAID achieves data protection using can use either
replication or parity.
Data protection with replication - Data protection using replication is achieved using Network
RAID-10, Network RAID-10+1, or Network RAID-10+2, which store two, three, or four mirrored
copies of the data.
Data protection with parity - Data protection using parity is achieved using Network RAID-5
and Network RAID-6, which store data and parity dynamically according to the number of
storage systems in a cluster. Under some workloads that write the data infrequently, Network
RAID-5 and Network RAID-6 provide better capacity utilization and similar high availability
to Network RAID-10 and Network RAID-10+1.
Former terminology in release 8.1 and earlier
Before release 8.5, you configured volumes with replication levels.
Data Protection LevelVolume Replication Level
Network RAID-0 (None)None
Network RAID-10 (2–Way Mirror)2–Way replication
Network RAID-10+1 (3–Way Mirror)3–Way replication
Network RAID-10+2 (4–Way Mirror)4–Way replication
Network RAID-5 (Single Parity) (new)
Network RAID-6 (Dual Parity) (new)
142 Provisioning storage